Publicité
Publicité

Contenu connexe

Publicité
Publicité

Data-Centric Protection: The Future of BYOD Security

  1. webinar july 12 2016 data-centric protection: the future of BYOD security
  2. cloud and mobile are inseparable... saas driving corporate data outside the firewall.
  3. STORYBOAR legacy data security secure the infrastructure
  4. STORYBOAR security must evolve to protect data outside the firewall ungoverned access to corporate data in the cloud sensitive data on unmanaged devices
  5. how well has byod adoption gone in your org?
  6. STORYBOAR ■ Impedes user privacy ■ Complex solution deployment and management ■ Lack of data visibility or protection manage the device the evolution of mobile security data-centric protection is the future mdm
  7. STORYBOAR ■ Impedes user privacy ■ Complex solution deployment and management ■ Lack of data visibility or protection ■ User privacy issues ■ Prevents use of native apps (mail/calendar) ■ 3rd party / cloud apps non-functional ■ Challenging deployments manage the device wrap the app the evolution of mobile security data-centric protection is the future mdm mam
  8. STORYBOAR ■ Impedes user privacy ■ Complex solution deployment and management ■ Lack of data visibility or protection ■ User privacy issues ■ Prevents use of native apps (mail/calendar) ■ 3rd party / cloud apps non-functional ■ Challenging deployments manage the device wrap the app secure the data the evolution of mobile security data-centric protection is the future ■ Protection of user privacy and experience ■ Any device, any app ■ Full data control and visibility for IT ■ Deploys in minutes, no mdm mam casb
  9. STORYBOAR employees are rejecting MDM and MAM ■ Employees are resisting IT “big brother” ■ 38% of IT professionals don’t participate in their own BYOD programs ■ 57% of employees refuse MDM/MAM for BYOD Bitglass BYOD Security Survey 2015
  10. “By 2018, more than half of all bring your own device (BYOD) users that currently have an MDM agent will be managed by an agentless solution” Rob Smith, John Girard, and Dionisio Zumerle, “How to Live With Unmanaged Devices,” August 2015.
  11. what are your biggest mobile security concerns?
  12. STORYBOAR a better approach : secure the data
  13. STORYBOAR agentless BYOD access via activesync ■ Secure mobile devices without invasive profiles or certificates ■ Protect data in “unwrappable” native apps like mail, contacts, calendar ■ Selectively wipe corporate data ■ Enforce device security policies ■ Full data control and visibility for IT
  14. STORYBOAR agentless BYOD access via reverse proxy ■ Secure access from any unmanaged device without agents ■ Users are automatically routed through the proxy via SSO ■ Full data control and visibility for IT ■ Control data access with context and content-aware DLP
  15. STORYBOAR data leakage prevention a complete set of data controls ■ Apply granular DLP to sensitive data with spectrum of actions from watermarking to outright blocking ■ Context-aware engine can distinguish between users, managed and unmanaged devices, and more ■ Easily modify sharing permissions and quarantine files for review
  16. STORYBOAR client: ■ 8000 employees ■ s&p 500 challenge: ■ Lack of adherence to BYOD security measures ■ Failed MobileIron and SAP Afaria deployments solution: ■ Bitglass Agentless – device / OS independent ■ Fast deployment ■ Logging for compliance with internal data security policies ■ Seamless integration with ActiveDirectory fortune 500 beverage co. byod security
  17. STORYBOAR HIPAA compliant mobility challenge: ■ Existing solution, AT&T Toggle, was obsolete ■ HIPAA-compliant BYOD ■ Migration path to Office 365 solution: ■ Agentless deployment ■ Usability, transparency & privacy ■ DLP of PII, PCI & PHI ■ Selective wipe; device PIN & encryption ■ Improved mobility for care providers major US hospital system
  18. STORYBOAR our mission total data protection est. jan 2013 100+ customer s tier 1 VCs
  19. resources: more info about byod ■ Report: BYOD Trends in Forward-Looking Industries ■ Report: MDMayhem - How MDM Software Exposes Personal Data ■ Case Study: Global Arms Giant Secures BYOD
  20. STORYBOAR bitglass.com @bitglass

Notes de l'éditeur

  1. but in building out our product, we realized that mobile security is also cloud security.
  2. How well has BYOD adoption gone in your organization? Much better than expected Slightly better than expected As expected Lower than expected We don’t allow BYOD
  3. What are your biggest mobile security concerns? Loss of control after download No control over access Theft or lost devices Something else
  4. Competition: AirWatch/VMWare
  5. in: CA, NY, MA, IL, N
Publicité